A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based sys...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Advanced Engineering and Science
2021
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/94806/1/ZalmiyahZakaria2021_AComparativeAnalysisofMetaheuristicAlgorithms.pdf http://eprints.utm.my/id/eprint/94806/ http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1146-1158 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.94806 |
---|---|
record_format |
eprints |
spelling |
my.utm.948062022-04-29T22:27:17Z http://eprints.utm.my/id/eprint/94806/ A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection Nordin, Noor Syahirah Ismail, Mohd. Arfian Sutikno, Tole Kasim, Shahreen Hassan, Rohayanti Zakaria, Zalmiyah Mohamad, Mohd. Saberi QA75 Electronic computers. Computer science Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure. Institute of Advanced Engineering and Science 2021-08 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/94806/1/ZalmiyahZakaria2021_AComparativeAnalysisofMetaheuristicAlgorithms.pdf Nordin, Noor Syahirah and Ismail, Mohd. Arfian and Sutikno, Tole and Kasim, Shahreen and Hassan, Rohayanti and Zakaria, Zalmiyah and Mohamad, Mohd. Saberi (2021) A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection. Indonesian Journal of Electrical Engineering and Computer Science, 23 (2). pp. 1146-1158. ISSN 2502-4752 http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1146-1158 DOI:10.11591/ijeecs.v23.i2.pp1146-1158 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Nordin, Noor Syahirah Ismail, Mohd. Arfian Sutikno, Tole Kasim, Shahreen Hassan, Rohayanti Zakaria, Zalmiyah Mohamad, Mohd. Saberi A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
description |
Phishing attack is a well-known cyber security attack that happens to many people around the world. The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. One of the methods is applying fuzzy system. Fuzzy system is a rule-based system that utilize fuzzy sets and fuzzy logic concept to solve problems. However, it is hard to achieve optimal solution when applied to complex problem where the process of identify the fuzzy parameter becomes more complicated. To cater this issue, an optimization method is needed to identify the parameter of fuzzy automatically. The optimization method derives from the metaheuristic algorithm. Therefore, the aim of this study is to make a comparative analysis between the metaheuristic algorithms in fuzzy modelling. The study was conducted to analyse which algorithm performed better when applied in two datasets: website phishing dataset (WPD) and phishing websites dataset (PWD). Then the results were obtained to show the performance of every metaheuristic algorithm in terms of convergence speed, and four metrics including accuracy, recall, precision, and f-measure. |
format |
Article |
author |
Nordin, Noor Syahirah Ismail, Mohd. Arfian Sutikno, Tole Kasim, Shahreen Hassan, Rohayanti Zakaria, Zalmiyah Mohamad, Mohd. Saberi |
author_facet |
Nordin, Noor Syahirah Ismail, Mohd. Arfian Sutikno, Tole Kasim, Shahreen Hassan, Rohayanti Zakaria, Zalmiyah Mohamad, Mohd. Saberi |
author_sort |
Nordin, Noor Syahirah |
title |
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
title_short |
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
title_full |
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
title_fullStr |
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
title_full_unstemmed |
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
title_sort |
comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection |
publisher |
Institute of Advanced Engineering and Science |
publishDate |
2021 |
url |
http://eprints.utm.my/id/eprint/94806/1/ZalmiyahZakaria2021_AComparativeAnalysisofMetaheuristicAlgorithms.pdf http://eprints.utm.my/id/eprint/94806/ http://dx.doi.org/10.11591/ijeecs.v23.i2.pp1146-1158 |
_version_ |
1732945396387282944 |
score |
13.209306 |